Internet Technologies - Tutorial
Internet Technologies - Tutorial
Evolution
The concept of the Internet was originated in 1969 and has undergone several
technological & Infrastructural changes as discussed below:
1. The origin of the Internet was coined from the concept of Advanced Research
Project Agency Network (ARPANET).
4. In 1972, the ARPANET spread over the globe with 23 nodes located in
different countries and thus became known as the Internet.
By the time, with the invention of new technologies such as TCP/IP protocols,
DNS, WWW, browsers, scripting languages etc., the Internet provided a
medium to publish and access information over the web.
How the Internet is useful to us
Internet is the best example of change in technology, internet has totally changed
the world, now approximately more than half of the world is connected to internet
no matters what devices you are using a Laptops, smartphones, desktops or by
other handheld devices, It also doesn't matters you are either at home, office,
travelling or so what.
With the ever-increasing usage of Internet, numerous activities have started taking
place in your computer world and it would be either for good or bad. These
activities may vary from identity theft too, stealing private passwords, documents,
and files in simple term a hacking attempt. The fact is that everything is now online
from shopping to banking to paying bills and so on, and opens us to these frauds
and makes us victims unless you have taken the necessary steps to protect your
computer
2. One can surf for any kind of information over the internet. Information
regarding various topics.
3. The Internet also serves a medium for entertainment like- Online Television,
Gaming, Songs & Videos.
4. The Internet allows us to use many services like- Internet Banking, Online
Shopping, Online Ticket Booking, E-mail
5. Most important but not the least internet has provided the concept
of electronic commerce, that allows the use of selling, buying online and
moreover includes the use of online transactions.
How the Internet is harmful to us
The bad impact of the internet is a cyber attack against organizations or individuals.
Losing your data – If your computer has been hacked or infected, there is a big chance
that all your stored data might be taken by the attacker.
Bad usage of your computer resources – This means that your compromised network or
the computer can be used to launch another attack without being coming to your notice like
a DDoS attack.
Reputation loss – Just think if your Facebook account or business email has been
compromised by an unknown cause and is being used to send fake information to your
friends, business partners. You will need time to gain back your reputation, on another hand
if same happened with the e-commerce site where the transaction is involved so that
particular site will take time to gain the trust and reputation back.
Identity theft – This is a case where your identity is stolen (photo, name surname,
address, and credit card) and can be used for a crime like making false identity documents.
The virus can easily be spread to the computers connected to the internet. Such virus
attacks may cause your system to crash or your important data may get deleted.
Internet Domain Name System
Domain Name System helps to resolve the hostname to an address.
IP Address
1. The IP address is the unique address assigned to each host present on the
Internet.
2. The IP address is 32 bits (4 bytes) long.
This document can be a web page, image, audio, video or anything else present on
the web.
For example,
www.XXXX.com/internet_technology/index.html
is an URL which is stored on XXXX web server under the internet_technology
directory.
1. Absolute URL
2. Relative URL
Domain Names
Domain Name is a symbolic string associated with an IP address. There are several
domain names available; some of them are generic such as com, edu, gov, net etc,
while some country level domain names such as a, in, za, etc.
Edu Education
Au Australia
in India
cl Chile
fr France
us United States
za South Africa
UK United Kingdom
jp Japan
es Spain
de Germany
ca Canada
ee Estonia
HK Hong Kong
Services over Internet
Communication Services
Electronic Mail
1
Used to send an electronic message over the internet.
Telnet
2
Used to log on to a remote computer that is attached to the internet.
Newsgroup
3
Offers a forum for people to discuss topics of common interests.
Mailing Lists
5 Used to organize a group of internet users to share common information
through e-mail.
Instant Messaging
7 Offers real-time chat between individuals and group of people. Eg. Yahoo
Messenger, WhatsApp, Facebook Messenger, Telegram, WeChat.
Video conferencing
Video conferencing or Video teleconferencing is a method of communicating by
8
two-way video and audio transmission with help of telecommunication
technologies.
Information Retrieval Services
Archie
2 It’s updated the database of public FTP sites and their content. It helps to
search a file by its name.
The World Wide Web is a way of accessing information over the medium of the
Internet. It is an information-sharing model. The Web uses the HTTP protocol, to
transmit data. Web services, which use HTTP to allow applications to communicate.
The Web also utilizes browsers, such as Internet Explorer or Firefox, to access
Web documents called Web pages that are linked to each other via
hyperlinks. Web documents also contain graphics, sounds, text, and video.
Internet Service Providers (ISP)
Internet Service Provider (ISP) is a company offering access to the internet.
They offer various services:
1. Internet Access.
Some of the big and small ISP's offering internet services in India are:-
Airtel
Vodafone
Idea
Reliance Communications
BSNL
Aircel
Tata Teleservices
MTNL
DEN Networks
Hathway
Spectranet
Tikona
ACT
Internet Protocols
There are only 2 protocols on basis of which the communication takes place over
the internet. First is TCP (Transmission Control Protocol), Second is UDP (User
Datagram Protocol).
Telnet TCP 23
Each user of email is assigned a unique name for his/her email account. This name
is known as an E-mail address. Different users can send and receive messages
according to the e-mail address.
E-mail Header:- The first five lines of an E-mail message is called E-mail header.
The header part comprises of following fields:
From
Date
To
Subject
CC & BCC
Difference between CC & BCC
BCC stands for Black Carbon Copy. It is used when we do not want one or
more of the recipients to know that someone else was copied on the
message.
SIGNATURE
Advantages
E-mail has proved to be powerful and reliable medium of communication. Here are
the benefits of E-mail:
Reliable
Convenience
Speed
Inexpensive
Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as
discussed below:
Forgery
Overload of the mailbox by either Junk/spam emails from advertising
agencies or from others.
Phishing mail
Email protocols
E-mail Protocols are set of rules that help the client to properly transmit the
information to or from the mail server. Here in this tutorial, we will discuss various
protocols such as SMTP, POP, and IMAP.
Only one mailbox can be created on the Multiple mailboxes can be created on
4
server. the server.
Mailer
Mail Server
Mailbox
Mailer
Mail Server
The function of the mail server is to receive, store and deliver the email. It is
must for mail servers to be running all the time and must have to be robust in
order to handle a heavy traffic flow because if it crashes or is down, email can be
lost.
Mailboxes
Mailbox is generally a folder that contains emails and information about them.
It’s good to archive your emails from time to time so that by any unknown cause
your system got infected by a virus is not working and the system got formatted at
least you may have the mail back if you have archived it.
There are several email service providers available in the market providing an
email.
1. Gmail by Google.
2. Hotmail by Microsoft.
ATM Mail
5.
ATM Mail is a free email service with good spam protection.
7. Short mail
8. Inbox.com
9. My Way Mail
Website Overview
The website is a set of related web pages, is hosted on a web server and is
accessed using Uniform Resource Locator (URL's).
Static websites
They are also known as stationary websites. Static websites are created using only
HTML.
Dynamic websites show different information at the different point in time. It has
been made possible using Ajax technology.
AJAX is a new technique for creating better, faster, and more interactive web
applications with the help of XML, HTML, CSS, and JavaScript.
Internet Connection
Internet connection is required to connect to a remotely located web server.
Web Server
Web server is the actual location where your website resides on or where the sites
are hosted on. A web server may host single or multiple sites depending on what
hosting service you have paid for.
Domain Name
A care should be taken to select a domain name. Your domain name should be easy
to remember and easy to type.
Domain Extensions
Domain Meaning
.edu Education
Web hosting
Web server is the actual location where your website resides on or where the sites
are hosted on
You a need a web server in order to host your website's. Now some of the
organizations like:- small or startups they are interested in order to spend a lot in
having their dedicated server on their premises for hosting a site, so for that they
contacts to a large organizations which provides a space on their servers to small
companies to host a sites thus charging them for that space either monthly or
yearly bases. Web hosting is a service of providing online space for storage of web
pages. These web pages are made available via World Wide Web. The companies
which offer website hosting are known as Web hosts.
The servers on which website is hosted remain switched on 24 x7. These servers
are run by web hosting companies. Each server has its own IP address. Since IP
addresses are difficult to remember, therefore, webmaster points their domain
name to the IP address of the server their website is stored on.
It is not possible to host your website on your local computer, to do so you would
have to leave your computer on 24 hours a day. This is not practical and cheaper as
well. This is where web hosting companies come in.
Types of Hosting
The following table describes different types of hosting that can be availed as per
the need:
Shared Hosting
In shared hosting, the hosting company puts thousand of the website on the
1.
same physical server. Each customer has their own allocation of physical web
space and a set of bandwidth limit.
Dedicated Server
2. In this kind of hosting, the single dedicated server is set up for just one
customer.
Reseller Hosting
3. A reseller acts as a middleman and sells hosting space of someone else’s
server.
Grid Hosting
Instead of utilizing one server, Grid Hosting spreads resources over a large
4.
number of servers. It is quite stable and flexible. The servers can be added or
taken away from the grid without crashing the system.
Web Hosting Companies
1. Blue Host
2. Go, Daddy
Web Browser
Earlier the web browsers were text-based while now a day's voice-based web
browsers are also available. Following are the most common web browser available
today:
Browser Vendor
Safari Apple
Search Engines & SEO
In order to Search something from the huge database information over the
internet, we need search engines for the search purpose.
Users can search for any information by passing the query in form of keywords or
phrase. It then searches for relevant information in its database and returns
relevant result to the user.
Examples
Google By Google.
Bing by Microsoft.
Ask
There are several web-based services are available which offer easy to interact
interface to connect with people within the world. There are also several mobile-
based services in for of apps such as WhatsApp, Hike, Line, vibe etc.
1. Facebook.
2. Twitter
3. LinkedIn
4. Flicker
5. WhatsApp
6. Hike
Internet Security
With the ever-increasing usage of Internet, numerous activities started taking place
in computer and networking world and it can be either for good or bad. These
activities vary from identity theft too, stealing private passwords, documents
and files all are the forms of hacking attempts. The fact is that everything is
now online thus makes us victims, we have to take the necessary steps to protect
your computer.
The attacks can be either against operating system, Applications or against a whole
network.
Internet Security Threats impacts the network, data security, and other internet
connected systems. Cybercriminals have evolved several techniques to treat
privacy and integrity of bank accounts, businesses, and organizations.
Worms
Malware
Spam, Phishing
Losing your data – If your computer has been hacked or infected, there is
a big chance that all your stored data might be taken by the attacker.
Reputation loss – Just think if your Facebook account or business email has
been compromised by an unknown cause and is being used to send fake
information to your friends,
business partners. You will need time to gain back your reputation, on
another hand if same happened with the e-commerce site where the
transaction is involved so that particular site will take time to gain the trust
and reputation back.
Identity theft – This is a case where your identity is stolen (photo, name
surname, address, and credit card) and can be used for a crime like making
false identity documents.
Basic Computer Security Checklist
With small things, we can prevent our computer, computer networks, other
resources from being compromised
3. Keep your desk clear not to stick your credential on the desk.
5. As the home user does check if the operating system is being updated with
latest security patch and antivirus because in the organization the IT staff are
there to take care of it.
6. Don't ever install freeware, games as by doing this you can harm yourself.
7. Don't open the mail that is claiming it from the bank with the subject
"congrats you have Pre-Qualified personal Loan offer of RS. 750000
at 12.99% from yes bank" or some with some other subject and forcing
you to provide your personal details by clicking on the link within the
message, beware the link can be a malicious and can redirect to some
infected sites or virus can get into your system.
9. Take a backup on a regular interval of time, so that the data can be restored
if the computer or network suffers from a cyber attack.
12.Disconnect all the shared resources from the computer which is more longer
in need.
14.Block Disk and Removable media: The idea is to block the use of CD, USB
or other removable media by blocking the ports and CD roam from the
server.
15.For the organization, it is recommended to use full encryption and 2FA (Two
Factor Authentication) method to protect the critical data. Windows has it's
inbuilt encryption solution (BitLocker Drive Encryption) by turning it on
you safely transfer your data by using USB stick because at another end
when you need to fetch the data from USB you need a password for that.
[autorun]
Open=setup.exe
1. Go to run.
2. Type gpedit.msc
3. If the prompt for the administrator password provide it and click allow. Under
the Computer Configuration, expand Administrative Templates, expand
Windows Components and then click Turn off Autoplay Policies.
4. On in the right side double click to Turn off Autoplay.
5. Click Enabled and then select all drives in order to disable the Autorun on all
drives.
6. Restart the computer.
Security Products
Antivirus is must for defense against any malware attack, Without this software,
there is a high chance that your systems and networks can be hit and can suffer
from hacking attacks and also can be affected by the various viruses. It is
important that the antivirus scan engine and virus signatures to be updated
regularly, we do this because if your system is hit by the latest malware it will be
detected.
Antivirus software scans each file in a system comparing each bit of code against
information in its database and if it finds a pattern duplicating one in the database,
it is considered a virus, and it will quarantine or delete that particular file, thus
allowing other files and marking them as safe.
All program files (executable) that enter a system go through the antivirus scan.
Those that match the signatures are classified as viruses and are blacklisted. The
other program files are allowed entry and would run in the system. Antivirus
software depends on the virus definitions to identify malware. That is the reason it
updates on the new viruses definitions. Malware definitions contain signatures for
any new viruses and other malware that has been classified as wild. If the antivirus
software scans any application or file and if it finds the file infected by a malware
that is similar to the malware in the malware definition. Then antivirus software
terminates the file from executing pushing it to the quarantine. DAT files contain
virus signatures and other information that anti-virus products use to protect your
computer against existing and new potential threats. DAT files are released on a
daily basis.
1. Signature-based detection
2. Behavioral-based detection
Signature-based detection
This is most common in Traditional antivirus software that checks all the.EXE files
and validates it with the known list of viruses and other types of malware. or it
checks if the unknown executable files show any misbehavior as a sign of unknown
viruses.
Behavioral-based detection
This type of detection is used in Intrusion Detection mechanism. This concentrates
more on detecting the characteristics of the malware during execution. This
mechanism detects malware only while the malware performs malware actions.
Updating antivirus is critical for the security of any system. This is because
any system gets constantly threatened and attacked by new viruses every day.
Antivirus updates would have latest definition files that are needed to identify and
combat new viruses.
Online Virus Testing
If you don't have antivirus installed on your system but you need to scan a file
which you got through the mail, I recommend using the online testing antivirus
engine which is one of the best – https://virustotal.com/.
It is a free and independent service. It uses multiple antivirus engines (58 anti-
virus
engines), so its result will be shown for all the 58 engines. It updates the engines in
real-time.
Please see the following screenshot, wherein I uploaded a file with a virus and the
result is 3/54 (Detection Ratio), which means that it has a virus and did not pass
the class, so it should not be opened.
A good feature of this site is URL checking, before entering to a website you can
enter the
URL and it checks for you if the site has an infection and can harm you. I did a test
with a URL and it came out to be clean and that too 100%, so I can visit it without
my computer being infected.
My recommendation is to use the paid version of antivirus, as free versions of anti-
viruses have nearly identical malware detection scores to the paid versions
produced by the same company.
You can get a review which is the best top rated free antivirus at the moment.
http://in.pcmag.com/antivirus-from-pc-ma/37090/guide/the-best-free-
antivirus-protection-of-2018
The main objective of this section is to provide you the knowledge about various
types of malware. This topic will cover Trojans, Virus, backdoor, worms and the
way they work, spreads to the system from the internet, their symptoms and their
effects. This section will also guide and tell you how to protect the devices and
assets from malware infection.
Firewalls
They can either be software or hardware appliance which operate at the network
level. They protect networks by limiting the access to the internet, they actually
inspect each and every packet that leave the networks and packets that get into
the network. The security administrator actually sets up the set of rules if the
packets match the preconfigured rules the rule will trigger and the block action will
take place, if no rule is triggered then packets are passed i.e. packets are allowed
either to get in to the network or to get out from network, Their position is
generally behind a router or in front of the router depending on the network
topologies. They work as packet filters this means that the firewall takes the
decisions to forward or not the packet based on source and destination addresses
and ports.
SIEM
1. McAfee.
2. Splunk.